2024-12-08 03:06:42 +00:00

143 lines
4.3 KiB
JSON

{
"id": "CVE-2008-3159",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-07-14T18:41:00.000",
"lastModified": "2024-11-21T00:48:35.520",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Integer overflow in ds.dlm, as used by dhost.exe, in Novell eDirectory 8.7.3.10 before 8.7.3 SP10b and 8.8 before 8.8.2 ftf2 allows remote attackers to execute arbitrary code via unspecified vectors that trigger a stack-based buffer overflow, related to \"flawed arithmetic.\""
},
{
"lang": "es",
"value": "Desbordamiento de entero en ds.dlm, como el utilizado en dhost.exe de Novell eDirectory 8.7.3.10 anterior a 8.7.3 SP10b y 8.8 anterior a 8.8.2 ftf2, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados que provocan un desbordamiento del b\u00fafer basado en pila. Relacionado con \"aritm\u00e9tica defectuosa\"."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-189"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:edirectory:8.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "029ADE6D-6761-4196-847C-A0EFB3A06341"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:edirectory:8.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D7548D05-AD2B-46C3-9036-366585FFCB48"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/30938",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1020431",
"source": "cve@mitre.org"
},
{
"url": "http://www.novell.com/support/search.do?cmd=displayKC&sliceId=SAL_Public&externalId=3694858",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/30085",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1999",
"source": "cve@mitre.org"
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-08-041/",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43589",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/30938",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1020431",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.novell.com/support/search.do?cmd=displayKC&sliceId=SAL_Public&externalId=3694858",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/30085",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2008/1999",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-08-041/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43589",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}